Skip to main content (Press Enter).
Sign in / Register
Skip auxiliary navigation (Press Enter).
Skip main navigation (Press Enter).
Become a Member
All Upcoming Events
Ohio Lit Sup Meeting
Women Who Lead
Publications & Surveys
Recordings & Presentations
Areas of Knowledge
Get Law Firm 101
Meet ILTA Leadership
Have a Great Idea?
2019 LegalSEC® Summit Audio Recordings and Session Materials are now available
Session recordings now available!
If you were unable to attend the 2019 LegalSEC Summit in DC this past week, or attended and had to choose between the great sessions being offered, we've now uploaded the recordings and presentation materials to the LegalSEC Resource Library under the
2019 LegalSEC Summit folder
. Please note that due to the nature of the content - the access to the materials and recordings will be restricted to
so members must be logged in when clicking on the links below.
THE LIST OF SESSIONS (AND MATERIALS AS THEY BECOME AVAILABLE) FOR THIS YEAR ARE BELOW:
Welcome and Introduction to Incident Response
Incident Response Table-Top Exercise
Building an Incident Response Plan
Incident Handling Tips
Q & A and Wrap-up (not recorded)
Keynote: William Evanina Discusses Cybersecurity, followed by Q&A
Growing Your Security Team
Leverage These Free Resources to Up Your Security and Governance Game
Mock a Hack by Using Social Engineering or the "Touchless Hack" (not recorded)
Tips & Tools in Malware Reverse Engineering
Developing a Culture of Security (not recorded)
DLP: What Is Everyone Doing?
Incident Response With Modest Resources
Microsoft Security Overview and Update
Phishing and Beyond: Educating your Users with Impact
You Haven’t [yet] Implemented Need to Know Access? (not recorded)
Email Risks and Remedies in the Stack 2.0
Ethical Hacker Gives a Demo (not recorded)
Secure your Vendor: Must-Have Vendor Controls presented by the LS-ISAO (not recorded)
The Role and Importance MSSP's and Security Partnerships Play in Security Operations
Information Governance Roundtable
Take Away the Hackers' Advantage in Realtime!
The Micro-Perimeter / Micro-Segmentation
Threat Intelligence - Mining the Dark Web
Automating and Standardizing Client Audit Requests and RFP Responses on Information Security
How to Sell the Importance of Information Security and Governance to Your Organization
Strategies and Importance for Developing the Proper Data Classifications for Your Organization
Supporting Incident Response and Responding to Suspected Compromised Systems on your Network
Crawling Your Network to Auto-Classify Sensitive Data Subject to Regulatory Control
Implementing the First Five CIS Controls
Protecting Your Firm from Insider Threats
Security Audits: Lots of Pain. Any Gain?
Ethical Hacking Tools (Not recorded)
IT Leaders with Modest Resources Roundtable (not recorded)
Managing, Securing and Retaining Emails Was Hard Enough...
SOAR and Other Emerging Technologies
Powered by Higher Logic